I had similar thoughts about firewall load balancing recently. I have
several PIX firewalls in failover config. I am not pushing anywhere near
100Mbps (I know they couldn't pass that much if I did), but they perform
fine. Instead of load balancing firewalls, I chose to have multiple
networks, that each have their own pair. As the network grows, I will split
the network based on load.
The other problem I had with the LB's in front of the firewalls, was being
able to protect them. The reason I have the firewalls is to control
traffic. I can't control traffic to thing outside the firewalls.
Jason Lewis
http://www.packetnexus.com
http://www.packetnexus.com/kb/greyarts/
It's not secure "Because they told me it was secure". The people at the
other end of the link know less about security than you do. And that's
scary.
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Smith, Steve
Sent: Wednesday, May 23, 2001 3:36 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: RE: Load Balancing/HA switches
I've been kicking this idea around for a while as well. I wonder how
much redundancy I get by loading 2-3 firewalls with a single FireProof
switch. It seems to move the failure point a little further outward,
that's all.
Many vendors advocate a "Firewall Sandwich" to provide HA to a firewall.
This means 2 load balancer/HA devices on the outside, and 2 load
balancers/HA devices for each security zone. So a simple 3 zone
(private, public, DMZ) firewall-cluster (let's say 2 firewalls) uses 6
load balancer/HA devices. At $15,000 ($90,000 total) that's not cheap
and I don't think I gain much in the way of redundancy in using this
configuration. It adds considerable administration and upkeep to the
design.
It seems the only commercial FW product that has a MAC/IP fail over is
FW-1. Not that I don't like FW-1 but it doesn't fit our organization
very well. There's an annoying gap in FW technology in regard to
redundancy. Actually that's not quite true, I can provide redundancy as
long as I don't mind adding 5X the hardware and $$$$$. Frustrating but
there's only so much I can get done in a 80 hour work week...
>Does anyone care to share opinions about Radware's FireProof switches
>versus the CSS 11000 line available from Cisco?
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]